Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-23599
Vulnerability from cvelistv5
Published
2024-09-16 16:38
Modified
2024-09-16 20:59
Severity ?
EPSS score ?
Summary
Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Seamless Firmware Updates for some Intel® reference platforms |
Version: See references |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-23599", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T20:59:11.485307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T20:59:21.281Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Seamless Firmware Updates for some Intel\u00c2\u00ae reference platforms", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.3, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en" }, { "cweId": "CWE-362", "description": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:38:40.858Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2024-23599", "datePublished": "2024-09-16T16:38:40.858Z", "dateReserved": "2024-01-24T04:00:22.607Z", "dateUpdated": "2024-09-16T20:59:21.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-23599\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2024-09-16T17:16:04.580\",\"lastModified\":\"2024-09-16T18:03:16.707\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.\"},{\"lang\":\"es\",\"value\":\"La condici\u00f3n de ejecuci\u00f3n en las actualizaciones de firmware sin interrupciones para algunas plataformas de referencia Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"NONE\",\"vulnerableSystemIntegrity\":\"HIGH\",\"vulnerableSystemAvailability\":\"HIGH\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"HIGH\",\"subsequentSystemAvailability\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H\",\"baseScore\":7.9,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":5.8}]},\"weaknesses\":[{\"source\":\"secure@intel.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html\",\"source\":\"secure@intel.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-23599\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-16T20:59:11.485307Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-16T20:59:17.607Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.9, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"Seamless Firmware Updates for some Intel\\u00c2\\u00ae reference platforms\", \"versions\": [{\"status\": \"affected\", \"version\": \"See references\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html\", \"name\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"denial of service\"}, {\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"shortName\": \"intel\", \"dateUpdated\": \"2024-09-16T16:38:40.858Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-23599\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-16T20:59:21.281Z\", \"dateReserved\": \"2024-01-24T04:00:22.607Z\", \"assignerOrgId\": \"6dda929c-bb53-4a77-a76d-48e79601a1ce\", \"datePublished\": \"2024-09-16T16:38:40.858Z\", \"assignerShortName\": \"intel\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
WID-SEC-W-2024-2117
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2024-12-23 23:00
Summary
Intel Prozessor: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessor ausnutzen, um seine Privilegien zu erhöhen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessor ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2117 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2117.json" }, { "category": "self", "summary": "WID-SEC-2024-2117 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2117" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01071 - UEFI Firmware vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01097 - Processor vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01103 - Processor RAPL Interface vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-243 vom 2024-09-10", "url": "https://www.dell.com/support/kbdoc/de-de/000225475/dsa-2024-243-security-update-for-dell-client-platform-for-intel-platform-update-2024-3-advisories" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-165524 vom 2024-09-11", "url": "https://support.lenovo.com/us/en/product_security/LEN-165524" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04701 vom 2024-09-12", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04701en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04702 vom 2024-09-12", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04702en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E6B5E38AE6 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e6b5e38ae6" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D6726B5D75 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d6726b5d75" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-1D4155BD39 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1d4155bd39" }, { "category": "external", "summary": "HPE SECURITY BULLETIN HPESBHF04699 rev.1 vom 2024-09-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04699en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A53UL5PPNSCLERJH4JPIPXJ2PZZ6ENPZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A53UL5PPNSCLERJH4JPIPXJ2PZZ6ENPZ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7033-1 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7033-1" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-397 vom 2024-10-03", "url": "https://www.dell.com/support/kbdoc/de-de/000231954/dsa-2024-397-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03981 vom 2024-09-11", "url": "https://support.hp.com/us-en/document/ish_11456827-11456849-16/HPSBHF03981" }, { "category": "external", "summary": "F5 Security Advisory K000141501 vom 2024-10-19", "url": "https://my.f5.com/manage/s/article/K000141501" }, { "category": "external", "summary": "F5 Security Advisory K000141503 vom 2024-10-19", "url": "https://my.f5.com/manage/s/article/K000141503" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1950 vom 2024-10-31", "url": "https://alas.aws.amazon.com/ALAS-2024-1950.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2682 vom 2024-11-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2682.html" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-178303 vom 2024-11-13", "url": "https://support.lenovo.com/us/en/product_security/LEN-178303" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-28EA86C8AA vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-28ea86c8aa" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-7DFC167DF4 vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7dfc167df4" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D20A106350 vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d20a106350" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3995-1 vom 2024-11-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3964 vom 2024-11-24", "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00022.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4053-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W55XIWF4ZIAHE3T6ORR5YPYWBSK4AFMG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4053-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/W55XIWF4ZIAHE3T6ORR5YPYWBSK4AFMG/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10528 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10528" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7149-1 vom 2024-12-11", "url": "https://ubuntu.com/security/notices/USN-7149-1" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04743en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04753en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04752en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-455 vom 2024-12-16", "url": "https://www.dell.com/support/kbdoc/de-de/000260794/dsa-2024-455-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "Debian Security Advisory DLA-4002 vom 2024-12-23", "url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00024.html" } ], "source_lang": "en-US", "title": "Intel Prozessor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-23T23:00:00.000+00:00", "generator": { "date": "2024-12-24T10:02:25.389+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2117", "initial_release_date": "2024-09-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-09-19T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP und F5 aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von LENOVO aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-12-23T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T036868", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "branches": [ { "category": "product_version", "name": "OneFS", "product": { "name": "Dell PowerScale OneFS", "product_id": "T034610", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs" } } }, { "category": "product_version_range", "name": "\u003c12.4.1", "product": { "name": "Dell PowerScale \u003c12.4.1", "product_id": "T039868" } }, { "category": "product_version", "name": "12.4.1", "product": { "name": "Dell PowerScale 12.4.1", "product_id": "T039868-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:12.4.1" } } } ], "category": "product_name", "name": "PowerScale" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "HP BIOS", "product": { "name": "HP BIOS", "product_id": "T033440", "product_identification_helper": { "cpe": "cpe:/h:hp:bios:-" } } }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T031286", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } }, { "category": "product_version", "name": "SimpliVity Server", "product": { "name": "HP Computer SimpliVity Server", "product_id": "T039806", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:simplivity_server" } } } ], "category": "product_name", "name": "Computer" } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } }, { "category": "product_name", "name": "HPE Synergy", "product": { "name": "HPE Synergy", "product_id": "T019820", "product_identification_helper": { "cpe": "cpe:/h:hpe:synergy:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Atom", "product": { "name": "Intel Prozessor Atom", "product_id": "T037508", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:atom" } } }, { "category": "product_version", "name": "Xeon", "product": { "name": "Intel Prozessor Xeon", "product_id": "T037509", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:xeon" } } }, { "category": "product_version", "name": "Pentium", "product": { "name": "Intel Prozessor Pentium", "product_id": "T037510", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:pentium" } } }, { "category": "product_version", "name": "Core", "product": { "name": "Intel Prozessor Core", "product_id": "T037512", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:core" } } }, { "category": "product_version", "name": "Celeron", "product": { "name": "Intel Prozessor Celeron", "product_id": "T037513", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:celeron" } } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T026557", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22351", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-22351" }, { "cve": "CVE-2023-23904", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-23904" }, { "cve": "CVE-2023-25546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-25546" }, { "cve": "CVE-2023-41833", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-41833" }, { "cve": "CVE-2023-42772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-42772" }, { "cve": "CVE-2023-43626", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-43626" }, { "cve": "CVE-2023-43753", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-43753" }, { "cve": "CVE-2024-21781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21781" }, { "cve": "CVE-2024-21829", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21829" }, { "cve": "CVE-2024-21871", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21871" }, { "cve": "CVE-2024-23599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-23599" }, { "cve": "CVE-2024-24968", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Intel Prozessor aufgrund von unzul\u00e4ssigen Finite State Machines (FSMs) in der Hardware-Logik. Ein lokaler Angreifer mit hohen Rechten kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037512", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-24968" }, { "cve": "CVE-2024-23984", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Intel Prozessor. Dieser Fehler betrifft die RAPL-Schnittstelle durch eine \u201eObservable discrepancy\u201c. Ein lokaler Angreifer mit hohen Rechten kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-23984" } ] }
wid-sec-w-2024-2117
Vulnerability from csaf_certbund
Published
2024-09-10 22:00
Modified
2024-12-23 23:00
Summary
Intel Prozessor: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Prozessor ist das zentrale Rechenwerk eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessor ausnutzen, um seine Privilegien zu erhöhen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Intel Prozessor ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2117 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2117.json" }, { "category": "self", "summary": "WID-SEC-2024-2117 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2117" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01071 - UEFI Firmware vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01097 - Processor vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01097.html" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-01103 - Processor RAPL Interface vom 2024-09-10", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01103.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-243 vom 2024-09-10", "url": "https://www.dell.com/support/kbdoc/de-de/000225475/dsa-2024-243-security-update-for-dell-client-platform-for-intel-platform-update-2024-3-advisories" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-165524 vom 2024-09-11", "url": "https://support.lenovo.com/us/en/product_security/LEN-165524" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04701 vom 2024-09-12", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04701en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04702 vom 2024-09-12", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04702en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-E6B5E38AE6 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-e6b5e38ae6" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D6726B5D75 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d6726b5d75" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-1D4155BD39 vom 2024-09-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1d4155bd39" }, { "category": "external", "summary": "HPE SECURITY BULLETIN HPESBHF04699 rev.1 vom 2024-09-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04699en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/A53UL5PPNSCLERJH4JPIPXJ2PZZ6ENPZ/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3332-1 vom 2024-09-19", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A53UL5PPNSCLERJH4JPIPXJ2PZZ6ENPZ/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7033-1 vom 2024-09-25", "url": "https://ubuntu.com/security/notices/USN-7033-1" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-397 vom 2024-10-03", "url": "https://www.dell.com/support/kbdoc/de-de/000231954/dsa-2024-397-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03981 vom 2024-09-11", "url": "https://support.hp.com/us-en/document/ish_11456827-11456849-16/HPSBHF03981" }, { "category": "external", "summary": "F5 Security Advisory K000141501 vom 2024-10-19", "url": "https://my.f5.com/manage/s/article/K000141501" }, { "category": "external", "summary": "F5 Security Advisory K000141503 vom 2024-10-19", "url": "https://my.f5.com/manage/s/article/K000141503" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-1950 vom 2024-10-31", "url": "https://alas.aws.amazon.com/ALAS-2024-1950.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2682 vom 2024-11-01", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2682.html" }, { "category": "external", "summary": "Lenovo Security Advisory LEN-178303 vom 2024-11-13", "url": "https://support.lenovo.com/us/en/product_security/LEN-178303" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-28EA86C8AA vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-28ea86c8aa" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-7DFC167DF4 vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-7dfc167df4" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D20A106350 vom 2024-11-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d20a106350" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3995-1 vom 2024-11-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-3964 vom 2024-11-24", "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00022.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4053-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W55XIWF4ZIAHE3T6ORR5YPYWBSK4AFMG/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4053-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/W55XIWF4ZIAHE3T6ORR5YPYWBSK4AFMG/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:10528 vom 2024-12-04", "url": "https://access.redhat.com/errata/RHSA-2024:10528" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7149-1 vom 2024-12-11", "url": "https://ubuntu.com/security/notices/USN-7149-1" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04743en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04753en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "HPE Security Bulletin vom 2024-12-11", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04752en_us\u0026docLocale=en_US" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-455 vom 2024-12-16", "url": "https://www.dell.com/support/kbdoc/de-de/000260794/dsa-2024-455-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities" }, { "category": "external", "summary": "Debian Security Advisory DLA-4002 vom 2024-12-23", "url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00024.html" } ], "source_lang": "en-US", "title": "Intel Prozessor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-23T23:00:00.000+00:00", "generator": { "date": "2024-12-24T10:02:25.389+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-2117", "initial_release_date": "2024-09-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-09-15T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-09-16T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-09-19T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-09-24T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-10-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-10-20T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von HP und F5 aufgenommen" }, { "date": "2024-10-31T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-11-12T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von LENOVO aufgenommen" }, { "date": "2024-11-13T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-11-17T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-24T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-11-25T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-03T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-11T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-12-23T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Debian aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T036868", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "branches": [ { "category": "product_version", "name": "OneFS", "product": { "name": "Dell PowerScale OneFS", "product_id": "T034610", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:onefs" } } }, { "category": "product_version_range", "name": "\u003c12.4.1", "product": { "name": "Dell PowerScale \u003c12.4.1", "product_id": "T039868" } }, { "category": "product_version", "name": "12.4.1", "product": { "name": "Dell PowerScale 12.4.1", "product_id": "T039868-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:powerscale_onefs:12.4.1" } } } ], "category": "product_name", "name": "PowerScale" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "HP BIOS", "product": { "name": "HP BIOS", "product_id": "T033440", "product_identification_helper": { "cpe": "cpe:/h:hp:bios:-" } } }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T031286", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } }, { "category": "product_version", "name": "SimpliVity Server", "product": { "name": "HP Computer SimpliVity Server", "product_id": "T039806", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:simplivity_server" } } } ], "category": "product_name", "name": "Computer" } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } }, { "category": "product_name", "name": "HPE Synergy", "product": { "name": "HPE Synergy", "product_id": "T019820", "product_identification_helper": { "cpe": "cpe:/h:hpe:synergy:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "Atom", "product": { "name": "Intel Prozessor Atom", "product_id": "T037508", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:atom" } } }, { "category": "product_version", "name": "Xeon", "product": { "name": "Intel Prozessor Xeon", "product_id": "T037509", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:xeon" } } }, { "category": "product_version", "name": "Pentium", "product": { "name": "Intel Prozessor Pentium", "product_id": "T037510", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:pentium" } } }, { "category": "product_version", "name": "Core", "product": { "name": "Intel Prozessor Core", "product_id": "T037512", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:core" } } }, { "category": "product_version", "name": "Celeron", "product": { "name": "Intel Prozessor Celeron", "product_id": "T037513", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:celeron" } } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T026557", "product_identification_helper": { "cpe": "cpe:/h:lenovo:computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-22351", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-22351" }, { "cve": "CVE-2023-23904", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-23904" }, { "cve": "CVE-2023-25546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-25546" }, { "cve": "CVE-2023-41833", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-41833" }, { "cve": "CVE-2023-42772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-42772" }, { "cve": "CVE-2023-43626", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-43626" }, { "cve": "CVE-2023-43753", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2023-43753" }, { "cve": "CVE-2024-21781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21781" }, { "cve": "CVE-2024-21829", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21829" }, { "cve": "CVE-2024-21871", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-21871" }, { "cve": "CVE-2024-23599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Intel Prozessor in der UEFI-Firmware. Diese Fehler sind auf verschiedene Sicherheitsprobleme zur\u00fcckzuf\u00fchren, darunter unsachgem\u00e4\u00dfe Eingabevalidierung, Zustands\u00fcberpr\u00fcfung und Zugriffskontrolle, Untrusted and NULL pointer dereferences, race conditions and out-of-bounds read and write issues. Ein lokaler Angreifer mit hohen Privilegien kann diese Schwachstellen ausnutzen, um erweiterte Privilegien zu erlangen, einen Denial-of-Service-Zustand zu erzeugen und vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T037508", "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037510", "T037512", "T037513", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-23599" }, { "cve": "CVE-2024-24968", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Intel Prozessor aufgrund von unzul\u00e4ssigen Finite State Machines (FSMs) in der Hardware-Logik. Ein lokaler Angreifer mit hohen Rechten kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "T037512", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-24968" }, { "cve": "CVE-2024-23984", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Intel Prozessor. Dieser Fehler betrifft die RAPL-Schnittstelle durch eine \u201eObservable discrepancy\u201c. Ein lokaler Angreifer mit hohen Rechten kann diese Schwachstelle ausnutzen, um vertrauliche Informationen preiszugeben." } ], "product_status": { "known_affected": [ "T039806", "T037509", "T034610", "67646", "T039868", "T036868", "74185", "T033440", "T031286", "T019820", "2951", "T002207", "T000126", "T001663", "398363", "T026557", "T009310" ] }, "release_date": "2024-09-10T22:00:00.000+00:00", "title": "CVE-2024-23984" } ] }
gsd-2024-23599
Vulnerability from gsd
Modified
2024-01-24 06:02
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-23599" ], "id": "GSD-2024-23599", "modified": "2024-01-24T06:02:25.072604Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-23599", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
ghsa-v63p-x2p8-f754
Vulnerability from github
Published
2024-09-16 18:31
Modified
2024-09-16 18:31
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
8.3 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H
8.3 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H
Details
Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.
{ "affected": [], "aliases": [ "CVE-2024-23599" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-16T17:16:04Z", "severity": "HIGH" }, "details": "Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.", "id": "GHSA-v63p-x2p8-f754", "modified": "2024-09-16T18:31:21Z", "published": "2024-09-16T18:31:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23599" }, { "type": "WEB", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "type": "CVSS_V4" } ] }
fkie_cve-2024-23599
Vulnerability from fkie_nvd
Published
2024-09-16 17:16
Modified
2024-09-16 18:03
Severity ?
Summary
Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in Seamless Firmware Updates for some Intel(R) reference platforms may allow a privileged user to potentially enable denial of service via local access." }, { "lang": "es", "value": "La condici\u00f3n de ejecuci\u00f3n en las actualizaciones de firmware sin interrupciones para algunas plataformas de referencia Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "id": "CVE-2024-23599", "lastModified": "2024-09-16T18:03:16.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.8, "source": "secure@intel.com", "type": "Secondary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "secure@intel.com", "type": "Secondary" } ] }, "published": "2024-09-16T17:16:04.580", "references": [ { "source": "secure@intel.com", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01071.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "secure@intel.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.